Next Steps Second version (-01) before IETF 68 Objective for next versions to identify and enumerate VoIP threats specific to SPEERMINT to specify security-related requirements specific to SPEERMINT Examples (input from Reinaldo Penno, too) Interception and Modification Threats Impersonating a proxy Call Rerouting DNS and ENUM Hijacking attack Interruption of Service Threats Distributed Denial of Service attacks to peering devices Discussion is expected to happen on mailing list as well |